ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
54528 | ISO/IEC 18033-1:2005/Amd 1:2011 | Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1 | Atcelts |
31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
40613 | ISO/IEC 15408-2:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements | Atcelts |
41933 | ISO/IEC 27000:2009 | Information technology — Security techniques — Information security management systems — Overview and vocabulary | Atcelts |
15530 | ISO 8372:1987 | Information processing — Modes of operation for a 64-bit block cipher algorithm | Atcelts |
67398 | ISO/IEC 27007:2017 | Information technology — Security techniques — Guidelines for information security management systems auditing | Atcelts |
77722 | ISO/IEC 27006:2015/Amd 1:2020 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1 | Atcelts |
19687 | ISO/IEC 11770-1:1996 | Information technology — Security techniques — Key management — Part 1: Framework | Atcelts |
39271 | ISO/IEC TR 15443-2:2005 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Atcelts |
34387 | ISO/IEC 18014-2:2002 | Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens | Atcelts |
Displaying 261-270 of 770 results.